Skip to content

Commit 619ae2d

Browse files
Update 2025-11-14-unlocking-seamless-access-how-to-ensure-users-can-create-connections-for-copilot-studio-agents.md
Final update without screenshots
1 parent d192176 commit 619ae2d

File tree

1 file changed

+32
-36
lines changed

1 file changed

+32
-36
lines changed

_posts/2025-11-14-unlocking-seamless-access-how-to-ensure-users-can-create-connections-for-copilot-studio-agents.md

Lines changed: 32 additions & 36 deletions
Original file line numberDiff line numberDiff line change
@@ -25,72 +25,67 @@ This blog post provides a **step-by-step guide** to:
2525
Connections are the backbone of Copilot Studio agents. If users lack permissions, agents cannot function properly. By aligning **Entra ID groups**, **Dataverse teams**, and **security roles**, you ensure a smooth experience for every user.
2626

2727
---
28+
> [!NOTE]
29+
> You can create a mock security group to test the tutorial end-to-end. We will explaining how to do so below.
2830
2931
## Step 1: Verify Entra ID Security Group Membership
30-
1. Go to **Microsoft Entra admin center**.
32+
1. Go to **Microsoft Entra admin center** (**https://entra.microsoft.com/**).
3133
2. Navigate to **Groups → Security Groups**.
3234
3. Confirm that all intended users are members of the relevant security group.
3335

36+
37+
3438
---
3539

3640
## Step 2: Create Corresponding Security Teams in Dataverse
37-
1. Open **Power Platform Admin Center (PPAC)**.
41+
1. Open **Power Platform Admin Center (PPAC)** (**https://admin.powerplatform.microsoft.com/**).
3842
2. Select the environment where your Copilot Studio agent resides.
3943
3. Go to **Settings → Users + Permissions → Teams**.
4044
4. Click **New Team**:
41-
- **Team Type**: *Azure AD Security Group*.
42-
- **Name**: Match the Entra ID group name for clarity.
43-
- **Azure AD Group ID**: Paste the Object ID of the Entra ID security group.
45+
4446
5. Assign appropriate **security roles** to this team (e.g., *Environment Maker*, *Basic User*, or custom roles granting connection creation).
4547

4648
---
4749

4850
## Step 3: Force Sync Users into Dataverse
49-
By default, sync happens periodically, but you can force it:
51+
By default, sync happens periodically. In order to make sure the latest changes regarding additions/removals of users are reflected immediately you need to force sync:
5052

51-
### Option A: Power Platform Admin Center
52-
- Navigate to **Users** in the environment.
53+
### Option A (manual): Power Platform Admin Center
54+
- Navigate to **Users** in the environment (**Manage → Environment → RespectiveEnvironment → User - See all**).
5355
- Click **Refresh** for the affected user(s).
5456

55-
### Option B: PowerShell (Single Environment)
56-
```powershell
57-
# Connect to Dataverse
58-
Add-PowerAppsAccount
57+
### Option B (automated): Triggered Power Automate Flow(s) that force syncs users (addition/removal)
5958

60-
# Force user sync for one environment
59+
* Go to **https://make.powerautomate.com/**
6160

62-
```
63-
### Option C: Bulk Sync for All Environments
64-
```powershell
65-
# Connect to Dataverse
66-
Add-PowerAppsAccount
61+
* Create a new **Automated cloud flow** and use the trigger
62+
**Office 365 Groups – When a group member is added or removed**.
6763

68-
# Get all environments and sync users
69-
Get-AdminPowerGet-AdminPowerAppEnvironment | ForEach-Object {
70-
Sync-AdminUser -EnvironmentName $_.EnvironmentName
71-
```
64+
* Choose the Entra Security Group you want to monitor.
7265

73-
## ✅ Step 4: Validate Access
74-
1. In PPAC, confirm that users appear under **Users** and are associated with the correct team.
75-
2. Check that the team has the required security roles.
76-
3. Test by having a user create a **connection reference** in a solution.
7766

78-
---
67+
* Add **Power Platform for Admins – Force Sync User**
68+
- **Environment:** select the target environment
69+
- **ObjectId:** use the trigger’s `User Id` dynamic value
70+
71+
* Then add **Dataverse – Perform a bound action**:
72+
- **Table:** `teams`
73+
- **Action:** `SyncGroupMembersToTeam`
74+
- **Row ID:** the GUID of the Dataverse Team linked to your security group
75+
76+
You can find it here:
7977

80-
## ✅ Step 5: Confirm Agent Connection Usage
78+
* Save and enable the flow.
79+
80+
And that's it. Now whenever you add/remove a user from the Entra ID security group, the automated cloud flow will be triggered, syncing the latest changes to the connected Dataverse security team.
81+
82+
## Step 5: Confirm Agent Connection Usage
8183
- In **Copilot Studio**, open the agent.
8284
- Verify that the agent uses the correct **connection reference**.
8385
- Ensure the user can run the agent without permission errors.
8486

8587
---
8688

87-
## Troubleshooting Tips
88-
- **Missing Users**: Ensure the Entra ID group Object ID is correct and the team type is set to *Azure AD Security Group*.
89-
- **Stale Roles**: Reassign roles to the team and refresh user access.
90-
- **Connection Errors**: Validate that the connection reference is mapped correctly in the solution.
91-
92-
---
93-
9489
## Best Practices
9590
- Always use **Azure AD Security Group Teams** for scalable permission management.
9691
- Assign roles at the **team level**, not individual users.
@@ -101,7 +96,8 @@ Get-AdminPowerGet-AdminPowerAppEnvironment | ForEach-Object {
10196

10297
## Outcome
10398
Following these steps ensures that:
104-
- Users added- Users added to Entra ID security groups are synced into Dataverse.
99+
- Users added to Entra ID security groups are synced into Dataverse.
100+
- Users removed to Entra ID security groups are also removed from linked Dataverse security teams
105101
- They inherit the correct permissions via security teams.
106102
- They can create and use connections required by Copilot Studio agents.
107103

0 commit comments

Comments
 (0)